You're receiving this bug because the package in Summary has produced _FORTIFY_SOURCE related warnings indicating the presence of a sure overflow in a static buffer. Even though this is not always an indication of a security problem it might even be. So please check this out ASAP. By the way, _FORTIFY_SOURCE is disabled when you disable optimisation, so don't try finding out the cause using -O0. Thanks, Your friendly neighborhood tinderboxer
Created attachment 249926 [details] Build log
Created attachment 250861 [details] Build log
QA: other │ │QA Notice: Package has poor programming practices which may compile │ │ fine but exhibit random runtime failures. │ │/usr/include/bits/stdio2.h:35:43: warning: call to int │ │__builtin___sprintf_chk(char*, int, long unsigned int, const char*, ...) will always overflow destination buffer │ │/usr/include/bits/stdio2.h:35:43: warning: call to int │ │__builtin___sprintf_chk(char*, int, long unsigned int, const char*, ...) will │ │always overflow destination buffer │ │/usr/include/bits/stdio2.h:35:43: warning: call to int │ │__builtin___sprintf_chk(char*, int, long unsigned int, const char*, ...) will │ │always overflow destination buffer │ │/usr/include/bits/string3.h:123:3: warning: call to __builtin___strncpy_chk will always overflow destination buffer
*** This bug has been marked as a duplicate of bug 329043 ***